Here is what to do if hackers encrypted your NAS server

hackers encrypted NAS server

“Our QNAP NAS server was hacked and encrypted. Please help! Can we recover our data?” Here is how you can recover files from a hacked and encrypted NAS server. It doesn’t necessarily need to be QNAP – but that brand was hit particularly badly in June 2020. Please take note – the server is a … Read more

Information Security Consultants Require Efficiency Controls To Be Effective

Information Security Consultants Require Efficiency

Significant losses can occur if you choose your information security consultants at random and have no clear plan and strategy of working with them. Here is a procedure for selecting a consultant, working with them, and controlling their performance throughout the duration of your project.  Efficient work means clarity of expectations on both sides and proper controls … Read more

Block exploits and malware by blocking ad networks and ads

Exploits and malware – sometimes even highly advanced ones – are sometimes distributed via ad networks and hacked websites. And while you can’t control the latter even if you have a whitelist policy on your web proxy, you can control which ads are seen in your network. The way it works:  Hackers know, that every … Read more

Six ways to protect your law firms data

The common elements across all law firms when it comes to protecting them from hacking attacks are:  Your document management system Your case management system Your filing system Printing management systems File sharing and collaboration Phone management systems Email – and in many cases, if a hacker gains access to someone’s email, they also gain … Read more

Top 10 of the best european cybersecurity consulting companies

eu cybersecurity companies

Every country in the European Union has its own local cybersecurity consulting companies. Atlant Security is one of them.  How to identify a good cybersecurity consulting company? The most important criteria when making a selection between multiple cybersecurity consulting companies is their business model. Do they primarily perform penetration tests with the aim of reselling … Read more

Becoming a cyber knight: learn!

become a cyber knight

Constant improvement is what your adversaries master at. Even though you might go for a new certificate from time to time – this is not the improvement I am talking about. Webinars are not improvement. Good, old-school reading and putting what you learned into practice is going to make you a master of your craft. … Read more

Risks of working from home for law firms

What are the risks using pirated software in your company

☠ Remote work has increased cybersecurity incidents by 25% and the majority of them are caused by pirated software or software downloaded by people from shady locations. I’ll give you an example: Previously while in the corporate network, people were (hopefully) prevented from downloading programs/binaries, instead, the IT department was doing that for them. Now, … Read more

Protect your law firm from hacking attacks

vulnerability management consulting program

Commercial law firms are one of the most lucrative and information-rich targets a hacker could have and most of them have never had a CISO nor used CISO as a Service to protect them. They are the object of attack by foreign governments (when the details of a deal are of interest to one or … Read more